~samiam/MaraDNS

83d168eac9828561c055ae12d30c07eef89478b7 — Sam Trenholme a month ago f46e723
It's actually CryptGenRandom() which makes random numbers
in Windows
2 files changed, 8 insertions(+), 8 deletions(-)

M CHANGELOG
M maradns-win32/Deadwood-win32/Reference.txt
M CHANGELOG => CHANGELOG +2 -2
@@ 5,8 5,8 @@ MaraDNS changelog

     * Documentation and other updates and cleanups.
     * Windows port no longer needs to have secret.txt file to run; the
       Deadwood Windows port now uses the Windows call
       CryptAcquireContext() to get entropy.
       Deadwood Windows port now uses the Windows call CryptGenRandom() 
       to get entropy.

     (2020-02-03)


M maradns-win32/Deadwood-win32/Reference.txt => maradns-win32/Deadwood-win32/Reference.txt +6 -6
@@ 194,7 194,7 @@ hash_magic_number
   keep the hash generator somewhat random and immune to certain
   types of attacks. In Deadwood 3.0, entropy for the hash function
   is created by looking at the contents of /dev/urandom
   (CryptAcquireContext() on Windows machines) and the current timestamp. 
   (CryptGenRandom() on Windows machines) and the current timestamp. 
   This parameter is only here so older configuration files do not break
   in Deadwood 3.0.



@@ 354,7 354,7 @@ ns_glueless_type
random_seed_file

   Note that this is not used in Windows, which instead uses
   the CryptAcquireContext() call to get entropy.
   the CryptGenRandom() call to get entropy.

   This is a file that contains random numbers, and is used as a
   seed for the cryptographically strong random number generator.


@@ 363,7 363,7 @@ random_seed_file

   Note that the hash compression function obtains some of its
   entropy before parsing the mararc file, and is hard-coded to get
   entropy from /dev/urandom (CryptAcquireContext() on Windows 
   entropy from /dev/urandom (CryptGenRandom() on Windows 
   systems).  Most other entropy used by Deadwood comes from the 
   file pointed to by random_seed_file.



@@ 645,7 645,7 @@ verbose_level
   (otherwise it is possible to forge DNS packets).

   The Windows port of Deadwood uses the Windows-specific
   CryptAcquireContext() call to generate random bits.
   CryptGenRandom() call to generate random bits.

   Note that Deadwood is not protected from someone on the same
   network viewing packets sent by Deadwood and sending forged


@@ 668,8 668,8 @@ verbose_level

   If using a precompiled binary of Deadwood, please ensure that
   the system has /dev/urandom support (on Windows system, 
   Deadwood uses CryptAcquireContext() get get random bits);
   Deadwood, at runtime, uses /dev/urandom (CryptAcquireContext() 
   Deadwood uses CryptGenRandom() get get random bits);
   Deadwood, at runtime, uses /dev/urandom (CryptGenRandom() 
   in Windows) as a hardcoded path to get entropy (along with the 
   timestamp) for the hash algorithm.